Ghassan Kbar

According to our database1, Ghassan Kbar authored at least 20 papers between 1997 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Multi-factor based enhancing students' motivations.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

A Comprehensive Protection Method for Securing the Organization's Network Against Cyberattacks.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

2016
Utilizing sensors networks to develop a smart and context-aware solution for people with disabilities at the workplace (design and implementation).
Int. J. Distributed Sens. Networks, 2016

A University-Based Smart and Context Aware Solution for People with Disabilities (USCAS-PWD).
Comput., 2016

2015
Smart behavior tracking system for People With Disabilities at the work place.
Proceedings of the 9th International Conference on Sensing Technology, 2015

Modeling the Interaction and Control of Smart Universal Interface for Persons with Disabilities.
Proceedings of the Human Aspects of IT for the Aged Population. Design for Everyday Life, 2015

2014
SMART workplace for persons with DISABiLitiEs (SMARTDISABLE).
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

E-HRM and Outsourcing For Arabic Countries and Large Organisations.
Proceedings of the Mobility, Intelligent Networks &Smart Societies, Proceedings of the 2nd BCS International IT Conference 2014, Abu Dhabi, United Arab Emirates, 9, 2014

2012
Smart and Context Aware Search for University Campus (SCASUC).
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2010
Wireless network token-based fast authentication.
Proceedings of the 17th International Conference on Telecommunications, 2010

2009
Security risk analysis based on probability of system failure, attacks and vulnerabilities.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Efficient Seamless Non-Broadcast Routing Algorithm for Wireless Mesh Network.
Proceedings of the NTMS 2008, 2008

Implementation of Efficient seamless non-broadcast Routing algorithm for Wireless Mesh Network.
Proceedings of the Advanced Techniques in Computing Sciences and Software Engineering, 2008

2007
Securing the Wireless LANs Against Internal Attacks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

2006
Distributed Resources Management in Wireless LANs.
Int. J. Bus. Data Commun. Netw., 2006

Analysis of Distributed Resource Management in Wireless LANs that Support Fault Tolerance.
Proceedings of the Wireless Information Systems, 2006

2005
Fast Wireless Authentication during Roaming to AP.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Mobile Station Location Based on Hybrid of Signal Strength and Time of Arrival.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

2004
Improved SSL application using session key based double key encryption/decryption (SDKED).
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

1997
Design and performance of a multiple parallel shared memory switch.
Comput. Commun., 1997


  Loading...